How to Upload Vulnerability Data
This example tutorial shows how to upload vulnerability data to the PCE. For more information, see Upload Vulnerability Data. The source of the vulnerability data in this example comes from Qualys®.
Goal
Upload authoritative vulnerability data for analysis in Illumination.
Steps
Do a non-authoritative upload of vulnerability data for examination:
ilo upload_vulnerability_report --input-file C:\Users\albert-einstein0.xml --source-scanner qualys --format xml
Examine a single uploaded vulnerability record identified by its vulnerability identifier,
qualys-38173
. See Vulnerability Identifier for information.ilo vulnerability read --xorg-id=1 --reference-id=qualys-38173
Do another non-authoritative upload of vulnerability data.
ilo upload_vulnerability_report --input-file C:\Users\albert-einstein99.xml --source-scanner qualys --format xml
Do an authoritative upload of vulnerability data, overwriting any previously uploaded records and adding any new vulnerability records.
ilo upload_vulnerability_report --input-file C:\Users\albert.einstein_FINAL.xml --authoritative --source-scanner qualys --format xml
Results
The authoritative vulnerability data has been uploaded and is ready for use in Illumination.